Nothing Special   »   [go: up one dir, main page]

CN112511483B - Data forwarding method, device and storage medium - Google Patents

Data forwarding method, device and storage medium Download PDF

Info

Publication number
CN112511483B
CN112511483B CN202010135471.9A CN202010135471A CN112511483B CN 112511483 B CN112511483 B CN 112511483B CN 202010135471 A CN202010135471 A CN 202010135471A CN 112511483 B CN112511483 B CN 112511483B
Authority
CN
China
Prior art keywords
communication node
access control
forwarding
control message
plane
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010135471.9A
Other languages
Chinese (zh)
Other versions
CN112511483A (en
Inventor
黄光平
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202010135471.9A priority Critical patent/CN112511483B/en
Priority to US17/909,071 priority patent/US20230089240A1/en
Priority to PCT/CN2020/135560 priority patent/WO2021174943A1/en
Publication of CN112511483A publication Critical patent/CN112511483A/en
Application granted granted Critical
Publication of CN112511483B publication Critical patent/CN112511483B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/741Routing in networks with a plurality of addressing schemes, e.g. with both IPv4 and IPv6
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/33Flow control; Congestion control using forward notification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2212/00Encapsulation of packets

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a data forwarding method, equipment and a storage medium. The method comprises the following steps: under the condition of receiving a user access request, packaging a tuple of the first communication node and an original access control message to obtain a first access control message; forwarding the first access control message to the second communication node according to a pre-arranged path.

Description

Data forwarding method, device and storage medium
Technical Field
The present application relates to communications, and in particular, to a data forwarding method, apparatus, and storage medium.
Background
The wired broadband access is a basic access service of home broadband, enterprise private line, public WiFi and the like, is a second main stream broadband access service except mobile broadband, and along with the high-speed development of the emerging access service of IPTV, high-definition video and the like, the traditional mode of integrating a forwarding control surface (i.e. a forwarding surface and a control surface) of wired access network equipment is not suitable for the requirements of a cloud network architecture, the rapid development and delivery of new service and the like. Wired broadband access device transfer separation based on software defined networks (Software Defined Network, SDN)/network function virtualization (Network Functions Virtualization, NFV) has become an industry consensus, and commercial deployment is obtained in some domestic and international markets, and the international and domestic related standard organizations are also actively standardized to realize interconnection and interworking of an access device transfer plane and a control plane. The separate deployment of the control surfaces has a deployment mode in the same network domain and a mode of separate deployment across different network domains, namely a message transmission mechanism between the control surfaces is required to support the two deployment modes.
For transmission of access control messages between conversion control surfaces of a Broadband Remote access server (Broadband Remote ACCESS SERVER, BRAS) (or Broadband network gateway (Broadband Network Gateway, BNG)), the two-layer transmission scheme based on intra-domain routing, such as a virtual extensible local area network (Virtual Extensible LAN, vxLAN), can not realize transmission of access control messages and can not conduct intelligent flow guidance on access message data streams for scenes where the conversion control surfaces are separated and deployed in different network domains; the other type is a transmission scheme based on a GPRS tunnel protocol (GPRS Tunneling Protocol-U, GTP-U), and the intelligent guidance of the flow of the access control message data cannot be supported.
Disclosure of Invention
The embodiment of the application provides a data forwarding method, equipment and a storage medium, which can realize intelligent flow guidance of access control message data while supporting intra-domain and cross-domain message transmission.
The embodiment of the application provides a data forwarding method, which is applied to a first communication node and comprises the following steps:
Under the condition of receiving a user access request, packaging a tuple of the first communication node and an original access control message to obtain a first access control message;
forwarding the first access control message to a second communication node according to a pre-arranged path.
The embodiment of the application provides a data forwarding method, which is applied to a second communication node and comprises the following steps:
receiving a first access control message sent by a first communication node;
And analyzing the first access control message to obtain a corresponding original access control message and a meta-array of the first communication node.
The embodiment of the application provides equipment, which comprises the following components: a memory, and one or more processors;
the memory is used for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods of any of the embodiments described above.
An embodiment of the present application provides a storage medium storing a computer program that, when executed by a processor, implements the method of any of the embodiments described above.
Drawings
Fig. 1 is a flowchart of a data forwarding method according to an embodiment of the present application;
fig. 2 is a flowchart of another data forwarding method according to an embodiment of the present application;
Fig. 3 is a schematic diagram of a TLV encapsulation format according to an embodiment of the present application;
fig. 4 is a schematic diagram of a forwarding plane and a control plane cross-domain transmission access control board message according to an embodiment of the present application;
Fig. 5 is a schematic diagram of a forwarding plane and a transmission access control board message in a control plane according to an embodiment of the present application;
fig. 6 is a block diagram of a data forwarding device according to an embodiment of the present application;
Fig. 7 is a block diagram of another data forwarding device according to an embodiment of the present application;
Fig. 8 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
Detailed Description
Embodiments of the present application will be described below with reference to the accompanying drawings.
The forwarding plane and the control plane of the wired broadband access equipment are separated, so that the control plane is intensively deployed, namely, deployed at the cloud end and is responsible for users and policy management thereof; the distributed deployment of the forwarding plane, namely, the distributed deployment of the forwarding plane is close to a user, and the uplink and downlink forwarding of the user traffic is processed by special forwarding hardware, so that the function division and the independent deployment of the control plane of the forwarding plane bring about the improvement of the operation efficiency and the benefit, and simultaneously, a brand new requirement is also provided for a message transmission scheme between the control plane and the forwarding plane.
The wired broadband access is generally divided into two stages of user access control and traffic forwarding, wherein the user access control flow includes user access request message interaction and authentication flow, such as point-to-point connection protocol (Point to Point Protocol over Ethernet, PPPoE)/Ethernet IP (IP over Ethernet, IPoE)/Layer 2 tunnel protocol (Layer 2 Tunneling Protocol, L2 TP), etc., initiated by a user access gateway, such as RG, accesses a forwarding plane (BRAS-UP) of a BRAS via AN access network device AN (e.g., DSLAM or OLT), and the BRAS-UP is responsible for performing access control interaction with a control plane (BRAS-CP) of the BRAS, the access control flow is completed, user authentication is successful, effective address allocation is obtained, and the user traffic forwarding flow is entered.
At present, the transmission of access control messages between BRAS (or BNG) transfer control surfaces in the industry is based on a two-layer transmission scheme of intra-domain routing, such as VxLAN, and the transmission of access control messages can not be realized and the intelligent guidance of the flow of access message data streams can not be performed for the scenes of the transfer control surfaces which are separately deployed in different network domains; the other type is a transmission scheme based on GTP-U protocol, and cannot support intelligent guidance of the flow of access control message data.
In view of this, the embodiment of the present application provides a data forwarding method, which is based on the BRAS (or BNG) forwarding control plane access control message transmission of the 6 th edition (Segment Routingv, SRv) of source routing, and simultaneously supports intra-domain and inter-domain message transmission, and simultaneously achieves intelligent traffic guidance of access control message data, thereby providing a more flexible and intelligent vbas (or DBNG) traffic engineering solution for operators.
Fig. 1 is a flowchart of a data forwarding method according to an embodiment of the present application. The present embodiment is applied to a first communication node. Illustratively, the first communication node is a network access control node forwarding plane, e.g., the network access control node forwarding plane may be a BRAS forwarding plane node (i.e., a BRAS forwarding plane) or a BNG control plane. As shown in fig. 1, the present embodiment includes S110 to S120.
And S110, under the condition that a user access request is received, packaging the element array of the first communication node and the original access control message to obtain the first access control message.
In an embodiment, a user access request refers to a request for a user to conduct network communications. In an embodiment, the access gateway initiates access to the BRAS forwarding plane via the access network device, and the BRAS forwarding plane is responsible for performing access control interaction with the BRAS control plane. In the process of transmitting the access control message between the BRAS forwarding plane and the BRAS control plane, besides the original access control message, the BRAS forwarding plane also needs to package the forwarding plane hardware element array to which the original access control message belongs together to obtain a first access control message.
S120, forwarding the first access control message to the second communication node according to a preset path.
In an embodiment, the second communication node may be a BRAS control plane node (BRAS control plane). In an embodiment, transmission of the access control message is performed between the forwarding plane and the control plane based on the BRAS or BNG of SRv. SRv6 is a network forwarding protocol that supports both intra-domain and inter-domain packet transport. Meanwhile, when the first access control message is transmitted, the BRAS forwarding plane can arrange a transmission path to the BRAS control plane according to the business process engineering requirement so as to directly transmit the first access control message carrying the hardware element array to the second communication node, thereby realizing intelligent flow guidance of the access control message while supporting intra-domain and inter-domain message transmission.
In an embodiment, encapsulating the original access control message and the hardware element array to which the original access control message belongs includes: expanding a tuple of the first communication node in a destination option expansion header of internet protocol version 6 (Internet Protocol Version, ipv 6) according to a first preset manner; or expanding the tuple of the first communication node in a source route extension message Structure (SRH) of SRv in a first preset manner.
In an embodiment, the first preset manner includes: type-Length-Value (TLV) mode. In an embodiment, encapsulation of the BRAS or BNG forwarding plane hardware element arrays may be supported based on the extensions of IPv6 and SRv. In one embodiment, the hardware element array of the encapsulated forwarding plane is extended in the destination option extension header (Destination Options Header) of IPv6, i.e., the hardware element array of the forwarding plane is encapsulated in the data portion of the destination option extension header in the manner of an IPv6 extension header TLV. In an embodiment, the metadata of the forwarding plane (BRAS-UP or DBNG-UP) is extended in the encapsulation header SRH of SRv, i.e. the hardware element array of the forwarding plane is encapsulated by TLV in an optional extension part of the SRH.
In one embodiment, the hardware element array includes at least one of the following: port number, line card number, board card number, slot number, and rack number. In the embodiment, in the process of packaging the hardware element array, the sequence of each metadata is not limited, that is, the sequence of the port number, the line card number, the board card number, the slot number and the rack number is not limited.
In one embodiment, the destination option extension header is placed before the two-layer header. In an embodiment, in order to ensure that the intermediate routing node does not identify and process the hardware element array during the process of transmitting the first access control message from the first communication node to the second communication node, the destination option extension header encapsulated with the hardware element array may be placed before the two-layer header, but not before the SRH.
In one embodiment, forwarding the first access control message to the second communication node according to a pre-programmed path includes: arranging a transmission path to a second communication node according to the service flow demand to obtain a first preset transmission path; and forwarding the first access control message to the second communication node according to the first preset transmission path.
In one embodiment, the transmission path to the second communication node is arranged according to the traffic demand, comprising: a table of segment route identifications (SEGMENT IDENTIFIER, SID) encapsulating the SRH sets the second communication node as a path termination point. In an embodiment, path arrangement based on SRv is performed on the BRAS forwarding plane or the BNG forwarding plane to implement on-demand steering of the first access control packet data flow.
Fig. 2 is a flowchart of another data forwarding method according to an embodiment of the present application. The embodiment is applied to the second communication node. Illustratively, the second communication node is a network access control node control plane, for example, the network access control node control plane may be a BRAS control plane or a BNG control plane. As shown in fig. 2, the present embodiment includes: S210-S220.
S210, receiving a first access control message sent by a first communication node.
S220, analyzing the first access control message to obtain a corresponding original access control message and a meta-array of the first communication node.
In an embodiment, after the second communication node receives the first access control message, the hardware element array for identifying the forwarding plane is parsed from the destination option extension header or the SRH, and the two-layer access control message (i.e., the original access control message) is parsed, and the access control message forwarding flow is terminated.
In an implementation manner, the embodiment of the application provides a solution for transmitting access control messages of a BRAS (or BNG) transfer control plane based on SRv, which simultaneously supports intra-domain and cross-domain message transmission, and simultaneously realizes intelligent guidance of traffic of access control message data, thereby providing a more flexible and intelligent solution for vbas (or DBNG) traffic engineering for operators.
In an embodiment, in addition to transmission of an access control message between a forwarding plane (such as BRAS-UP or DBNG-UP) and a control plane (such as BRAS-CP or DBNG-CP) and an original access control message body (such as PPPoE, IPoE, L2TP, etc.), the forwarding plane needs to package and send a forwarding plane hardware element array (Meta data) (such as an interface, a port number, a line card number, a board card number, a slot number, etc.) to which the original access message belongs together to the control plane, so that the control plane can accurately correspond to the corresponding forwarding plane to perform subsequent control message interaction, and these metadata (which may also be referred to as element arrays) do not belong to the original access control message (two-layer protocol message), and an extension dedicated field needs to be extended for encapsulation.
In a first scheme, the metadata of the forwarding plane is extended in the destination option extension header of IPv6, that is, the metadata of the forwarding plane is encapsulated in the data portion of the destination extension header by using the manner of IPv6 extension header TLV, where each metadata has no specific order requirement between TLVs, and may include: a port number; a line card number; a board number; a slot number; frame number.
And forwarding the access control message transmission facing the control plane, wherein in order to ensure that each element array type is correctly identified, the upper two bits of an IPv6 or SRv type field are 10, and the CHG is 0, namely the element data cannot be changed at an intermediate node. The metadata is read and parsed, the application is only related to the control plane, i.e. the end point of the transfer transmission route, and the intermediate node does not need to process, so the destination option extension header must be placed before the two-layer header (for example, the two-layer access packet such as IPoE, PPPoE, L2TP, etc.), but cannot be placed before the SRH. In this way, a terminal network Function (Function) end. Bng-u is newly defined, the forwarding plane metadata and the access control message in the two layers are extracted, and the access control forwarding flow is terminated. The Type values are uniformly distributed and coordinated by IANA and the like, and can be distributed and coordinated by enterprises or alliances in the local application scene, so that the global characteristics of the Type values are ensured. Fig. 3 is a schematic diagram of a TLV encapsulation format according to an embodiment of the present application. As shown in fig. 3, the forwarding plane may encapsulate metadata in the order of type-length-value.
And in the case of intelligent guidance of the access control message data flow, path arrangement based on SRv is carried out on the forwarding surface, so that the on-demand guidance of the access control message data flow is realized.
Scheme II, metadata of a forwarding plane (BRAS-UP & DBNG-UP) is extended in an encapsulation header SRH of SRv, namely, the metadata of the forwarding plane is encapsulated in an optional extension part of the SRH in a TLV mode, and no specific order is required between the metadata TLVs, wherein the method comprises the following steps: a port number; a line card number; a board number; a slot number; frame number.
The routing node between the forwarding plane and the control plane does not need to recognize and process the above metadata, and only understands the encapsulation metadata at the control plane, i.e. the termination point. Therefore, a termination point network Function (Function) is newly defined to extract the forwarding plane metadata and the access control message in the two layers, and terminate the access control forwarding flow. The Type values are uniformly distributed and coordinated by IANA and the like, and can be distributed and coordinated by enterprises or alliances in the local application scene, so that the global characteristics of the Type values are ensured.
And carrying out SRv-based path arrangement on a forwarding surface, thereby realizing on-demand guidance of the data flow of the access control message.
In the embodiment, in the transmission of the access control message with the BRAS (or BNG) forwarding control separation of the fixed network, besides the transmission from the forwarding plane to the control plane, the transmission from the control plane to the forwarding plane is also unicast transmission (except for the 1+1 hot standby protection scenario), and likewise, the access control message is transmitted through SRv to realize flexible path arrangement, unlike the transmission from the forwarding plane to the control plane, in this scenario, encapsulation of metadata is not required.
In the embodiment, the forwarding plane node may be a physical node or a virtual node, and in both cases, the forwarding plane needs to encapsulate its own metadata to inform the control plane. In the case of a virtual forwarding plane, metadata includes, but is not limited to, a virtual port number, a virtual slot number, and the type may reuse the metadata definition corresponding to the physical forwarding plane.
In one implementation, the access control message is transmitted across domains based on the BRAS (or BNG) forwarding plane and the control plane of SRv. In an embodiment, forwarding plane metadata is encapsulated by an extension destination option extension header. Fig. 4 is a schematic diagram of a forwarding plane and a control plane cross-domain transmission access control board packet according to an embodiment of the present application.
As shown in fig. 4, a forwarding plane (UP) and a Control Plane (CP) belong to two different network domains, after a user access control message forwarded by an RG arrives at the UP, the UP composes a transmission path of a cross-domain control plane, i.e. a SID table of an encapsulation SRH, according to a traffic engineering requirement, and sets a control plane node as a path termination point, so as to guide the access control message traffic to be transmitted according to a specified path. Meanwhile, the metadata of the UP is packaged in a destination option extension header in a TLV format, the extension header is placed in front of a two-layer message header, the packaged SRv data message is forwarded in a cross-domain mode according to a path indicated by a SID table, and the intermediate routing node does not recognize and process the forwarding plane metadata. After receiving the message, the control plane node analyzes and identifies the forwarding plane metadata from the destination option extension header, analyzes the two-layer access control message, and terminates the forwarding flow of the access control message.
In one implementation, the access control message is transmitted across domains based on the BRAS (BNG) forwarding plane and the control plane of SRv. In an embodiment, forwarding plane metadata is encapsulated by extending the SRH optional portion.
As shown in fig. 4, the forwarding plane and the control plane belong to two different network domains, after the user access control message forwarded by the RG reaches UP, the UP composes a transmission path of the cross-domain control plane according to the traffic flow engineering requirement, i.e. encapsulates the SID table of the SRH, and sets the control plane node as a path termination point, so as to guide the access control message flow to be transmitted according to the designated path. And at the same time, expanding the SRH optional part, encapsulating metadata, and encapsulating the metadata in a TLV format. And carrying out cross-domain forwarding on the packaged SRv data message according to a path indicated by the SID table, wherein the intermediate node does not recognize and process the forwarding surface metadata. After receiving the message, the control plane node analyzes and identifies the forwarding plane metadata from the SRH, analyzes the two-layer access control message, and terminates the forwarding flow of the access control message.
In one implementation, the access control message is transmitted in-domain based on the BRAS (or BNG) forwarding plane and the control plane of SRv. In an embodiment, forwarding plane metadata is encapsulated by an extension destination option extension header. Fig. 5 is a schematic diagram of a forwarding plane and a transmission access control board message in a control plane according to an embodiment of the present application.
As shown in fig. 5, the forwarding plane UP and the control plane CP belong to the same network domain, after the user access control message forwarded by the RG arrives at the UP, the UP composes a transmission path to the control plane, i.e. an SID table of the encapsulation SRH, according to the traffic flow engineering requirement, and sets a control plane node as a path termination point, so as to guide the access control message flow to be transmitted according to a specified path. Meanwhile, the metadata of the UP is packaged in a destination option extension header, the extension header is placed in front of a two-layer message header, the packaged SRv data message is subjected to intra-domain forwarding according to a path indicated by the SID list, and the intermediate node does not recognize and process the forwarding surface metadata. After receiving the message, the control plane node analyzes and identifies the forwarding plane metadata from the destination option extension header, analyzes the two-layer access control message, and terminates the forwarding flow of the access control message.
In one implementation, the access control message is transmitted across domains based on the BRAS (BNG) forwarding plane and the control plane of SRv. In an embodiment, forwarding plane metadata is encapsulated by extending the SRH optional portion.
As shown in fig. 5, the forwarding plane and the control plane belong to the same network domain, after the user access control message forwarded by the RG arrives at the UP, the UP composes a transmission path to the control plane according to the traffic engineering requirement, i.e. the SID table of the encapsulation SRH, and sets the control plane node as a path termination point, so as to guide the access control message traffic to be transmitted according to the specified path. And at the same time, expanding the SRH optional part, encapsulating metadata, and encapsulating the metadata in a TLV format. And carrying out intra-domain forwarding on the packaged SRv data message according to a path indicated by the SID table, wherein the intermediate node does not recognize and process the forwarding surface metadata. After receiving the message, the control plane node analyzes and identifies the forwarding plane metadata from the SRH header, analyzes the two-layer access control message, and terminates the forwarding flow of the access control message.
In an embodiment, fig. 6 is a block diagram of a data forwarding device according to an embodiment of the present application. The present embodiment is applied to a first communication node. As shown in fig. 6, the present embodiment includes: encapsulation module 310 and forwarding module 320.
The encapsulation module 310 is configured to encapsulate the primitive array of the first communication node and the original access control message to obtain a first access control message when receiving the user access request;
the forwarding module 320 is configured to forward the first access control message to the second communication node according to a pre-programmed path.
The data forwarding device provided in this embodiment is configured to implement the data forwarding method applied to the first communication node in the embodiment shown in fig. 1, and the implementation principle and the technical effect of the data forwarding device provided in this embodiment are similar, and are not repeated here.
In one embodiment, encapsulating the tuple of the first communication node and the original access control message includes:
Expanding the element array of the first communication node in the destination option expansion header of the IPv6 according to a first preset mode; or alternatively
The array of elements of the first communication node is extended in the SRH of SRv in a first preset manner.
In one embodiment, the destination option extension header is placed before the two-layer header.
In an embodiment, the first preset manner includes: type-length-value TLV mode.
In one embodiment, the hardware element array includes at least one of the following: port number, line card number, board card number, slot number, and rack number.
In one embodiment, forwarding the first access control message to the second communication node according to a pre-programmed path includes:
Arranging a transmission path to a second communication node according to the service flow demand to obtain a first preset transmission path;
and forwarding the first access control message to the second communication node according to the first preset transmission path.
In one embodiment, the transmission path to the second communication node is arranged according to the traffic demand, comprising: and packaging the SID table of the SRH, and setting the second communication node as a path termination point.
In one embodiment, the first communication node is a broadband access server, BRAS, forwarding plane node, and the second communication node is a BRAS control plane node.
In an embodiment, fig. 7 is a block diagram of another data forwarding device according to an embodiment of the present application. The embodiment is applied to the second communication node. As shown in fig. 7, the present embodiment includes: the receiving module 410 and the parsing module 420.
A receiving module 410, configured to receive a first access control message sent by a first communication node;
the parsing module 420 is configured to parse the first access control message to obtain a corresponding primitive set of the first communication node and the primitive set of the original access control message.
The data forwarding device provided in this embodiment is configured to implement the data forwarding method applied to the second communication node in the embodiment shown in fig. 2, and the implementation principle and the technical effect of the data forwarding device provided in this embodiment are similar, and are not repeated here.
Fig. 8 is a schematic structural diagram of an apparatus according to an embodiment of the present application. As shown in fig. 8, the apparatus provided by the present application includes: a processor 510, a memory 520, and a communication module 530. The number of processors 510 in the device may be one or more, one processor 510 being illustrated in fig. 8. The amount of memory 520 in the device may be one or more, one memory 520 being illustrated in fig. 8. The processor 510, memory 520, and communication module 530 of the device may be connected by a bus or otherwise, for example in fig. 8. In this embodiment, the device is a first communication node.
The memory 520 serves as a computer readable storage medium, and may be configured to store a software program, a computer executable program, and modules, such as program instructions/modules (e.g., an encapsulation module and a forwarding module in a data forwarding device) corresponding to the apparatus according to any embodiment of the present application. Memory 520 may include a storage program area that may store an operating system, at least one application program required for functionality, and a storage data area; the storage data area may store data created according to the use of the device, etc. In addition, memory 520 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some examples, memory 520 may further include memory located remotely from processor 510, which may be connected to the device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
A communication module 530 arranged to make a communication connection between the first communication node and the second communication node for data communication and signal communication.
The device provided above may be configured to perform the data forwarding method applied to the first communication node provided in any of the foregoing embodiments, and have corresponding functions and effects.
In the case that the device is the second communication node, the above provided device may be configured to execute the data forwarding method applied to the second communication node provided in any of the above embodiments, and have corresponding functions and effects.
The embodiments of the present application also provide a storage medium containing computer executable instructions which, when executed by a computer processor, are adapted to perform a data forwarding method applied to a first communication node, the method comprising: under the condition of receiving a user access request, packaging a tuple of the first communication node and an original access control message to obtain a first access control message; forwarding the first access control message to the second communication node according to a pre-arranged path.
The embodiment of the present application also provides a storage medium containing computer executable instructions which, when executed by a computer processor, are adapted to perform a data forwarding method applied to a second communication node, the method comprising: receiving a first access control message sent by a first communication node; and analyzing the first access control message to obtain a corresponding primitive access control message and a primitive array of the first communication node.
It will be appreciated by those skilled in the art that the term user equipment encompasses any suitable type of wireless user equipment, such as mobile telephones, portable data processing devices, portable web browsers, or car-mounted mobile stations.
In general, the various embodiments of the application may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the application is not limited thereto.
Embodiments of the application may be implemented by a data processor of a mobile device executing computer program instructions, e.g. in a processor entity, either in hardware, or in a combination of software and hardware. The computer program instructions may be assembly instructions, instruction set architecture (Instruction Set Architecture, ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages.
The block diagrams of any of the logic flows in the figures of this application may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions. The computer program may be stored on a memory. The Memory may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as, but not limited to, read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), optical storage devices and systems (digital versatile Disk (Digital Video Disc, DVD) or Compact Disk (CD)), and the like. The computer readable medium may include a non-transitory storage medium. The data processor may be of any type suitable to the local technical environment, such as, but not limited to, general purpose computers, special purpose computers, microprocessors, digital signal processors (DIGITAL SIGNAL Processing, DSP), application SPECIFIC INTEGRATED Circuits (ASIC), programmable logic devices (Field-Programmable GATE ARRAY, FGPA), and processors based on a multi-core processor architecture.

Claims (8)

1. A data forwarding method, applied to a first communication node, comprising:
Under the condition of receiving a user access request, packaging a tuple of the first communication node and an original access control message to obtain a first access control message;
forwarding the first access control message to a second communication node according to a pre-arranged path;
the encapsulating the element array of the first communication node and the original access control message includes:
Expanding a tuple of the first communication node in an IPv 6-based source route expansion message structure SRH of a source route version 6 SRv according to a first preset mode;
the first communication node is a broadband access server (BRAS) forwarding plane node, and the second communication node is a BRAS control plane node.
2. The method of claim 1, wherein the first preset manner comprises: type-length-value TLV mode.
3. The method of claim 1, wherein the array of elements comprises at least one of: port number, line card number, board card number, slot number, and rack number.
4. The method of claim 1, wherein forwarding the first access control message to the second communication node according to the pre-programmed path comprises:
Arranging a transmission path to a second communication node according to the service flow demand to obtain a first preset transmission path;
forwarding the first access control message to a second communication node according to the first preset transmission path.
5. The method of claim 4, wherein the routing the transmission path to the second communication node according to traffic demand comprises: and encapsulating a segment route identification (SID) table of the SRH, and setting the second communication node as a path termination point.
6. A data forwarding method, applied to a second communication node, comprising:
receiving a first access control message sent by a first communication node;
analyzing the first access control message to obtain a corresponding primitive array of the original access control message and the first communication node;
the tuple is encapsulated by a first communication node, and specifically comprises:
Expanding a tuple of the first communication node in an IPv 6-based source route expansion message structure SRH of a source route version 6 SRv according to a first preset mode;
the first communication node is a broadband access server (BRAS) forwarding plane node, and the second communication node is a BRAS control plane node.
7. An apparatus, comprising: a memory, and one or more processors;
the memory is used for storing one or more programs;
When executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-6.
8. A storage medium storing a computer program which, when executed by a processor, implements the method of any one of claims 1-6.
CN202010135471.9A 2020-03-02 2020-03-02 Data forwarding method, device and storage medium Active CN112511483B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202010135471.9A CN112511483B (en) 2020-03-02 2020-03-02 Data forwarding method, device and storage medium
US17/909,071 US20230089240A1 (en) 2020-03-02 2020-12-11 Data forwarding method and apparatus, device, and storage medium
PCT/CN2020/135560 WO2021174943A1 (en) 2020-03-02 2020-12-11 Data forwarding method and apparatus, and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010135471.9A CN112511483B (en) 2020-03-02 2020-03-02 Data forwarding method, device and storage medium

Publications (2)

Publication Number Publication Date
CN112511483A CN112511483A (en) 2021-03-16
CN112511483B true CN112511483B (en) 2024-11-05

Family

ID=74953261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010135471.9A Active CN112511483B (en) 2020-03-02 2020-03-02 Data forwarding method, device and storage medium

Country Status (3)

Country Link
US (1) US20230089240A1 (en)
CN (1) CN112511483B (en)
WO (1) WO2021174943A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113810288B (en) * 2021-09-17 2023-05-02 新华三信息安全技术有限公司 Message backhaul method and device
CN116346716A (en) * 2021-12-24 2023-06-27 华为技术有限公司 Message processing method and device and communication system
WO2024000135A1 (en) * 2022-06-28 2024-01-04 新华三技术有限公司 Packet processing
CN117372166B (en) * 2023-10-26 2024-03-08 北京开科唯识技术股份有限公司 Efficient tail-end distribution processing method, device and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150673A (en) * 2017-06-16 2019-01-04 华为技术有限公司 Message encapsulating method and device based on BRAS system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140269724A1 (en) * 2013-03-04 2014-09-18 Telefonaktiebolaget L M Ericsson (Publ) Method and devices for forwarding ip data packets in an access network
CN111884933B (en) * 2016-07-01 2021-07-09 华为技术有限公司 Method, device and system for forwarding message in Service Function Chain (SFC)
CN106411664B (en) * 2016-09-14 2019-08-27 中国联合网络通信集团有限公司 A kind of metropolitan area network system
US10454822B2 (en) * 2017-07-27 2019-10-22 Cisco Technology, Inc. Full-path validation in segment routing
CN109561021B (en) * 2017-09-25 2021-08-20 华为技术有限公司 Message forwarding method and network equipment
CN108616431B (en) * 2018-04-20 2020-09-08 新华三技术有限公司 Message processing method, device, equipment and machine readable storage medium
CN110266592B (en) * 2019-06-21 2021-07-30 Ut斯达康通讯有限公司 Communication method and device for SRV6 network and IP MPLS network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150673A (en) * 2017-06-16 2019-01-04 华为技术有限公司 Message encapsulating method and device based on BRAS system

Also Published As

Publication number Publication date
WO2021174943A1 (en) 2021-09-10
US20230089240A1 (en) 2023-03-23
CN112511483A (en) 2021-03-16

Similar Documents

Publication Publication Date Title
CN112511483B (en) Data forwarding method, device and storage medium
US11765000B2 (en) Method and system for virtual and physical network integration
CN110557316B (en) Message transmission method, system, device and computer readable storage medium
WO2017054576A1 (en) Unicast tunnel building method, apparatus and system
CN103391296A (en) Controller, openflow switch and method and system of channel establishing
CN111193644A (en) vBRAS service transmission method, device, terminal equipment and medium
CN109936492A (en) A kind of methods, devices and systems by tunnel transmission message
EP3930283A1 (en) Communication method, apparatus and system
WO2015100585A1 (en) Fiber-to-the-distribution point device and communication method therefor
CN108306755B (en) Method and system for establishing management channel
CN111327445A (en) Message sampling method, decapsulation method, node, system and storage medium
US11489768B2 (en) Method for creating inter-domain bidirectional tunnel, communication method and device, and storage medium
CN111277426B (en) IOAM information processing method and device
US20230018346A1 (en) Dial-up packet processing method, network element, system, and network device
CN109302504B (en) Method for establishing control signaling channel in PTN, PTN network element and storage medium
CN116488958A (en) Gateway processing method, virtual access gateway, virtual service gateway and related equipment
WO2021232920A1 (en) Data transmission method, electronic device, and storage medium
EP2858415B1 (en) Multi-link-based data transmission method and device
CN114006860B (en) User access method, system and device
WO2023125774A1 (en) Vxlan packet transmission method, network device, and system
EP4340303A1 (en) Data forwarding method and apparatus, storage medium, and electronic apparatus
WO2022267875A1 (en) Packet transmission method and related device
EP4287568A1 (en) Information processing method, and device and storage medium
CN112543135B (en) Apparatus, method and device for communication, and computer-readable storage medium
WO2019176683A1 (en) Relay device and relay method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant